Login / Signup
Detection of attacks based on compromise marks.
Nataliia Cherniashchuk
Serhiy Kostiuchko
Published in:
DESSERT (2022)
Keyphrases
</>
detection algorithm
automatic detection
detection accuracy
countermeasures
trade off
object detection
detection method
attack detection
database
data sets
false positives
detection rate
watermarking scheme
detection scheme
traffic analysis
terrorist attacks